miasm
Reverse engineering framework
mn_pinsr.Test_PINSRB Class Reference
Inheritance diagram for mn_pinsr.Test_PINSRB:
Collaboration diagram for mn_pinsr.Test_PINSRB:

Public Member Functions

def check (self)
 
- Public Member Functions inherited from asm_test.Asm_Test_32
def init_machine (self)
 
- Public Member Functions inherited from asm_test.Asm_Test
def __init__ (self, jitter)
 
def __call__ (self)
 
def asm (self)
 
def run (self)
 
def __init__ (self, jitter)
 
def __call__ (self)
 
def asm (self)
 
def run (self)
 
def __init__ (self, jitter_engine)
 
def test_init (self)
 
def prepare (self)
 
def __call__ (self)
 
def run (self)
 
def asm (self)
 

Static Public Attributes

string TXT
 
- Static Public Attributes inherited from asm_test.Asm_Test_32
string arch_name = "x86_32"
 
int arch_attrib = 32
 
int ret_addr = 0x1337beef
 
- Static Public Attributes inherited from asm_test.Asm_Test
int run_addr = 0x0
 

Additional Inherited Members

- Public Attributes inherited from asm_test.Asm_Test
 loc_db
 
 myjit
 
 assembly
 

Member Function Documentation

◆ check()

def mn_pinsr.Test_PINSRB.check (   self)

Reimplemented from asm_test.Asm_Test.

Here is the call graph for this function:

Member Data Documentation

◆ TXT

string mn_pinsr.Test_PINSRB.TXT
static
Initial value:
= '''
main:
CALL next
.byte 0x88, 0x77, 0x66, 0x55, 0x44, 0x33, 0x22, 0x11
.byte 0x08, 0x07, 0x06, 0x05, 0x04, 0x03, 0x02, 0x01
next:
POP EBP
MOVQ MM0, QWORD PTR [EBP]
MOVQ MM1, MM0
PINSRW MM1, QWORD PTR [EBP+0x8], 2
RET
'''

The documentation for this class was generated from the following file: